|
Linux Kernel
3.7.1
|
#include <linux/module.h>#include <linux/slab.h>#include <linux/file.h>#include <linux/fs.h>#include <linux/xattr.h>#include <linux/evm.h>#include "ima.h"Go to the source code of this file.
Functions | |
| int | ima_store_template (struct ima_template_entry *entry, int violation, struct inode *inode) |
| void | ima_add_violation (struct inode *inode, const unsigned char *filename, const char *op, const char *cause) |
| int | ima_get_action (struct inode *inode, int mask, int function) |
| int | ima_must_measure (struct inode *inode, int mask, int function) |
| int | ima_collect_measurement (struct integrity_iint_cache *iint, struct file *file) |
| void | ima_store_measurement (struct integrity_iint_cache *iint, struct file *file, const unsigned char *filename) |
| void | ima_audit_measurement (struct integrity_iint_cache *iint, const unsigned char *filename) |
| void ima_audit_measurement | ( | struct integrity_iint_cache * | iint, |
| const unsigned char * | filename | ||
| ) |
| int ima_collect_measurement | ( | struct integrity_iint_cache * | iint, |
| struct file * | file | ||
| ) |
ima_get_action - appraise & measure decision based on policy. : pointer to inode to measure : contains the permission mask (MAY_READ, MAY_WRITE, MAY_EXECUTE) : calling function (FILE_CHECK, BPRM_CHECK, FILE_MMAP)
The policy is defined in terms of keypairs: subj=, obj=, type=, func=, mask=, fsmagic= subj,obj, and type: are LSM specific. func: FILE_CHECK | BPRM_CHECK | FILE_MMAP mask: contains the permission mask fsmagic: hex value
Returns IMA_MEASURE, IMA_APPRAISE mask.
1.8.2